Loading…
Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding
Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Li...
Saved in:
Published in: | Circuits, systems, and signal processing systems, and signal processing, 2021-09, Vol.40 (9), p.4370-4406 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23 |
---|---|
cites | cdi_FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23 |
container_end_page | 4406 |
container_issue | 9 |
container_start_page | 4370 |
container_title | Circuits, systems, and signal processing |
container_volume | 40 |
creator | Folifack Signing, V. R. Fozin Fonzin, T. Kountchou, M. Kengne, J. Njitacke, Z. T. |
description | Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Likewise, the security of medical images, personal images, captures from military satellites, plans to build banks and many others require the protection of digital images. Thereby, jointly based on the special randomness generated by a chaotic Jerk system with hump structure and DNA coding, a cryptosystem is proposed in this article for both text and image encryption. A preliminary study on the dynamic properties of a Jerk system as well as DNA coding is carried out, respectively, for the exploration of the phenomena and the implementation of the encryption technique. Through standard nonlinear analysis tools, the full dynamics of the system is explored and feasibility is confirmed through PSpice investigations. The simulated experimental results, as well as the security analysis, show quantitatively and qualitatively that the proposed encryption technique does not only offer better performance in comparison with some existing algorithms but is also sufficiently fast for practical applications while resisting the known attacks but also. |
doi_str_mv | 10.1007/s00034-021-01665-1 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2557918541</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2557918541</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23</originalsourceid><addsrcrecordid>eNp9kMtOwzAQRS0EEqXwA6wssQ7MJHYSL6tQaBGCRVvEznJSu00hD2xH0L8nJUjsWM2MdO4d6RByiXCNAMmNA4CIBRBiABjHPMAjMkIeYcDTJD0mIwiTNIAUX0_JmXM7ABRMhCPykm1V48uCPmj7Rhd753VFP0u_pbOuaunC267wndXUNJYu9Zenql7TeaU2mk7rwu5bXzY1Xbmy3tDbpwnNmnW_npMTo96dvvidY7K6my6zWfD4fD_PJo9BEaHwASYRi6HIY-AJE5AkmAuhjIiRmdQoCA2HXEXCQH_yda4wxzwUgjGFUazCaEyuht7WNh-ddl7ums7W_UsZcp4ITDnDngoHqrCNc1Yb2dqyUnYvEeTBnxz8yd6f_PEnD6FoCLkerjfa_lX_k_oGibdxTw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2557918541</pqid></control><display><type>article</type><title>Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding</title><source>Springer Nature</source><creator>Folifack Signing, V. R. ; Fozin Fonzin, T. ; Kountchou, M. ; Kengne, J. ; Njitacke, Z. T.</creator><creatorcontrib>Folifack Signing, V. R. ; Fozin Fonzin, T. ; Kountchou, M. ; Kengne, J. ; Njitacke, Z. T.</creatorcontrib><description>Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Likewise, the security of medical images, personal images, captures from military satellites, plans to build banks and many others require the protection of digital images. Thereby, jointly based on the special randomness generated by a chaotic Jerk system with hump structure and DNA coding, a cryptosystem is proposed in this article for both text and image encryption. A preliminary study on the dynamic properties of a Jerk system as well as DNA coding is carried out, respectively, for the exploration of the phenomena and the implementation of the encryption technique. Through standard nonlinear analysis tools, the full dynamics of the system is explored and feasibility is confirmed through PSpice investigations. The simulated experimental results, as well as the security analysis, show quantitatively and qualitatively that the proposed encryption technique does not only offer better performance in comparison with some existing algorithms but is also sufficiently fast for practical applications while resisting the known attacks but also.</description><identifier>ISSN: 0278-081X</identifier><identifier>EISSN: 1531-5878</identifier><identifier>DOI: 10.1007/s00034-021-01665-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Behavior ; Chaos theory ; Circuits and Systems ; Cryptography ; Data encryption ; Digital data ; Digital imaging ; Electrical Engineering ; Electronics and Microelectronics ; Engineering ; Equilibrium ; Exchanging ; Image coding ; Instrumentation ; Medical imaging ; Military engineering ; Military satellites ; Multimedia ; Nonlinear analysis ; Satellite imagery ; Security ; Signal processing ; Signal,Image and Speech Processing</subject><ispartof>Circuits, systems, and signal processing, 2021-09, Vol.40 (9), p.4370-4406</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23</citedby><cites>FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23</cites><orcidid>0000-0002-8385-8058</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Folifack Signing, V. R.</creatorcontrib><creatorcontrib>Fozin Fonzin, T.</creatorcontrib><creatorcontrib>Kountchou, M.</creatorcontrib><creatorcontrib>Kengne, J.</creatorcontrib><creatorcontrib>Njitacke, Z. T.</creatorcontrib><title>Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding</title><title>Circuits, systems, and signal processing</title><addtitle>Circuits Syst Signal Process</addtitle><description>Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Likewise, the security of medical images, personal images, captures from military satellites, plans to build banks and many others require the protection of digital images. Thereby, jointly based on the special randomness generated by a chaotic Jerk system with hump structure and DNA coding, a cryptosystem is proposed in this article for both text and image encryption. A preliminary study on the dynamic properties of a Jerk system as well as DNA coding is carried out, respectively, for the exploration of the phenomena and the implementation of the encryption technique. Through standard nonlinear analysis tools, the full dynamics of the system is explored and feasibility is confirmed through PSpice investigations. The simulated experimental results, as well as the security analysis, show quantitatively and qualitatively that the proposed encryption technique does not only offer better performance in comparison with some existing algorithms but is also sufficiently fast for practical applications while resisting the known attacks but also.</description><subject>Algorithms</subject><subject>Behavior</subject><subject>Chaos theory</subject><subject>Circuits and Systems</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Digital data</subject><subject>Digital imaging</subject><subject>Electrical Engineering</subject><subject>Electronics and Microelectronics</subject><subject>Engineering</subject><subject>Equilibrium</subject><subject>Exchanging</subject><subject>Image coding</subject><subject>Instrumentation</subject><subject>Medical imaging</subject><subject>Military engineering</subject><subject>Military satellites</subject><subject>Multimedia</subject><subject>Nonlinear analysis</subject><subject>Satellite imagery</subject><subject>Security</subject><subject>Signal processing</subject><subject>Signal,Image and Speech Processing</subject><issn>0278-081X</issn><issn>1531-5878</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kMtOwzAQRS0EEqXwA6wssQ7MJHYSL6tQaBGCRVvEznJSu00hD2xH0L8nJUjsWM2MdO4d6RByiXCNAMmNA4CIBRBiABjHPMAjMkIeYcDTJD0mIwiTNIAUX0_JmXM7ABRMhCPykm1V48uCPmj7Rhd753VFP0u_pbOuaunC267wndXUNJYu9Zenql7TeaU2mk7rwu5bXzY1Xbmy3tDbpwnNmnW_npMTo96dvvidY7K6my6zWfD4fD_PJo9BEaHwASYRi6HIY-AJE5AkmAuhjIiRmdQoCA2HXEXCQH_yda4wxzwUgjGFUazCaEyuht7WNh-ddl7ums7W_UsZcp4ITDnDngoHqrCNc1Yb2dqyUnYvEeTBnxz8yd6f_PEnD6FoCLkerjfa_lX_k_oGibdxTw</recordid><startdate>20210901</startdate><enddate>20210901</enddate><creator>Folifack Signing, V. R.</creator><creator>Fozin Fonzin, T.</creator><creator>Kountchou, M.</creator><creator>Kengne, J.</creator><creator>Njitacke, Z. T.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2P</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>S0W</scope><orcidid>https://orcid.org/0000-0002-8385-8058</orcidid></search><sort><creationdate>20210901</creationdate><title>Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding</title><author>Folifack Signing, V. R. ; Fozin Fonzin, T. ; Kountchou, M. ; Kengne, J. ; Njitacke, Z. T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Behavior</topic><topic>Chaos theory</topic><topic>Circuits and Systems</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Digital data</topic><topic>Digital imaging</topic><topic>Electrical Engineering</topic><topic>Electronics and Microelectronics</topic><topic>Engineering</topic><topic>Equilibrium</topic><topic>Exchanging</topic><topic>Image coding</topic><topic>Instrumentation</topic><topic>Medical imaging</topic><topic>Military engineering</topic><topic>Military satellites</topic><topic>Multimedia</topic><topic>Nonlinear analysis</topic><topic>Satellite imagery</topic><topic>Security</topic><topic>Signal processing</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Folifack Signing, V. R.</creatorcontrib><creatorcontrib>Fozin Fonzin, T.</creatorcontrib><creatorcontrib>Kountchou, M.</creatorcontrib><creatorcontrib>Kengne, J.</creatorcontrib><creatorcontrib>Njitacke, Z. T.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest Science Journals</collection><collection>ProQuest Engineering Database</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>ProQuest Central Basic</collection><collection>DELNET Engineering & Technology Collection</collection><jtitle>Circuits, systems, and signal processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Folifack Signing, V. R.</au><au>Fozin Fonzin, T.</au><au>Kountchou, M.</au><au>Kengne, J.</au><au>Njitacke, Z. T.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding</atitle><jtitle>Circuits, systems, and signal processing</jtitle><stitle>Circuits Syst Signal Process</stitle><date>2021-09-01</date><risdate>2021</risdate><volume>40</volume><issue>9</issue><spage>4370</spage><epage>4406</epage><pages>4370-4406</pages><issn>0278-081X</issn><eissn>1531-5878</eissn><abstract>Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Likewise, the security of medical images, personal images, captures from military satellites, plans to build banks and many others require the protection of digital images. Thereby, jointly based on the special randomness generated by a chaotic Jerk system with hump structure and DNA coding, a cryptosystem is proposed in this article for both text and image encryption. A preliminary study on the dynamic properties of a Jerk system as well as DNA coding is carried out, respectively, for the exploration of the phenomena and the implementation of the encryption technique. Through standard nonlinear analysis tools, the full dynamics of the system is explored and feasibility is confirmed through PSpice investigations. The simulated experimental results, as well as the security analysis, show quantitatively and qualitatively that the proposed encryption technique does not only offer better performance in comparison with some existing algorithms but is also sufficiently fast for practical applications while resisting the known attacks but also.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s00034-021-01665-1</doi><tpages>37</tpages><orcidid>https://orcid.org/0000-0002-8385-8058</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0278-081X |
ispartof | Circuits, systems, and signal processing, 2021-09, Vol.40 (9), p.4370-4406 |
issn | 0278-081X 1531-5878 |
language | eng |
recordid | cdi_proquest_journals_2557918541 |
source | Springer Nature |
subjects | Algorithms Behavior Chaos theory Circuits and Systems Cryptography Data encryption Digital data Digital imaging Electrical Engineering Electronics and Microelectronics Engineering Equilibrium Exchanging Image coding Instrumentation Medical imaging Military engineering Military satellites Multimedia Nonlinear analysis Satellite imagery Security Signal processing Signal,Image and Speech Processing |
title | Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T10%3A29%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Chaotic%20Jerk%20System%20with%20Hump%20Structure%20for%20Text%20and%20Image%20Encryption%20Using%20DNA%20Coding&rft.jtitle=Circuits,%20systems,%20and%20signal%20processing&rft.au=Folifack%20Signing,%20V.%20R.&rft.date=2021-09-01&rft.volume=40&rft.issue=9&rft.spage=4370&rft.epage=4406&rft.pages=4370-4406&rft.issn=0278-081X&rft.eissn=1531-5878&rft_id=info:doi/10.1007/s00034-021-01665-1&rft_dat=%3Cproquest_cross%3E2557918541%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2557918541&rft_id=info:pmid/&rfr_iscdi=true |